首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators 绿色技术创新伙伴关系的博弈论分析:设备制造商和网络运营商
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-21 DOI: 10.1007/s12243-024-01012-w
Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang

While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.

尽管越来越多的电信公司开始采用绿色创新(GI),但对创新与合作决策的条件仍缺乏研究。本文提出了一个整合创新水平、信任和知识投资维度的数学模型。本文讨论了各种情景下的创新与合作行为。本文采用进化博弈论方法进行了模拟,以观察不同参数对创新形成的影响。模拟分析提出了每种情景下的最优策略。研究电信运营商的绿色创新行为以及创新策略对运营和收入的影响,对于电信运营商在产业生态系统中选择有利的创新策略、寻找合适的合作伙伴并形成相对稳定的合作关系具有借鉴意义。
{"title":"Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators","authors":"Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang","doi":"10.1007/s12243-024-01012-w","DOIUrl":"https://doi.org/10.1007/s12243-024-01012-w","url":null,"abstract":"<p>While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"20 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139920278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Troubleshooting distributed network emulation 分布式网络模拟故障排除
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-19 DOI: 10.1007/s12243-024-01010-y
Houssam ElBouanani, Chadi Barakat, Walid Dabbous, Thierry Turletti

Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.

分布式网络仿真器允许用户通过在较少机器的集群上运行大规模虚拟网络来进行网络评估。虽然它们为研究人员评估其贡献和社区重现其结果提供了可访问的测试环境,但它们对有限的物理网络和计算资源的使用会无声无息地对仿真结果产生负面影响。在本文中,我们介绍了一种使用线性优化从仿真级数据包延迟测量中提取物理基础设施信息的方法,以便以最少的假设找出仿真不准确的根本原因。我们使用数值模拟评估了我们方法的精确性,然后展示了该方法在真实网络场景中的实施效果。
{"title":"Troubleshooting distributed network emulation","authors":"Houssam ElBouanani,&nbsp;Chadi Barakat,&nbsp;Walid Dabbous,&nbsp;Thierry Turletti","doi":"10.1007/s12243-024-01010-y","DOIUrl":"10.1007/s12243-024-01010-y","url":null,"abstract":"<div><p>Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"227 - 239"},"PeriodicalIF":1.8,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139911182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications 面向未来物联网和 IIoT 应用的可扩展、以用户为中心的 HC-RAN 中的试点功率优化
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-16 DOI: 10.1007/s12243-024-01014-8
Hareesh Ayanampudi, Ravindra Dhuli

In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.

本文考虑了一种以用户为中心的可扩展 HC-RAN,其中每个远程无线电头(RRH)通过使用时分双工(TDD)模式在相同的时间/频率资源上为用户设备(UE)提供服务。无论网络中的 UE 数量多少,网络的可扩展性都会导致基带单元(BBU)池的前端负荷和计算复杂度保持不变。在信道估计阶段,每个 RRH 将根据从 UE 接收到的先导信号获取信道状态信息(CSI)。利用可用的 CSI,每个 RRH 将在上行和下行链路中分别对所需的 UE 信息进行解码/预编码。然而,在超密集网络中,先导污染是一个主要限制因素,会严重影响系统性能。针对这一问题,我们提出了一种上行链路先导功率优化算法,该算法考虑了由于先导共享和 RRH 选择造成的用户间干扰。在该算法中,先导功率系数的设计方式是降低信道估计的均方误差(MSE)。为此,我们采用了连续凸近似法。此外,我们还推导出了每个 UE 可实现频谱效率 (SE) 的闭式表达式,该表达式适用于任何先导/数据功率优化和 RRH 选择方案。结果表明,所提出的算法能显著提高信道估计阶段的系统性能,而且更适用于城市环境。
{"title":"Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications","authors":"Hareesh Ayanampudi, Ravindra Dhuli","doi":"10.1007/s12243-024-01014-8","DOIUrl":"https://doi.org/10.1007/s12243-024-01014-8","url":null,"abstract":"<p>In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"17 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network 基于集群的异构无线传感器网络节能路由协议
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-13 DOI: 10.1007/s12243-024-01015-7
Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan

The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.

无线传感器网络中的传感器节点能量有限。因此,有必要通过有效利用能源来确保延长网络的使用寿命。在无线传感器网络中使用基于集群的路由选择是解决能源问题和提高网络寿命的最有效方法之一。本文提出了一种基于集群的高能效路由协议,名为异构网络集群路由协议(Cluster Routing Protocol for Heterogeneous Network,CPHN)。所提出的 CPHN 利用节点的初始能量和剩余能量水平来选择能效最高的节点作为簇首,从而延长无线传感器网络的寿命。拟议方案利用节点的 CH 选择概率、剩余能量和初始能量来选择合适的节点作为 CH。仿真结果表明,拟议的协议在网络寿命、吞吐量和稳定期方面都优于现有的各种聚类协议。
{"title":"Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network","authors":"Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan","doi":"10.1007/s12243-024-01015-7","DOIUrl":"https://doi.org/10.1007/s12243-024-01015-7","url":null,"abstract":"<p>The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"64 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards feature engineering for intrusion detection in IEC–61850 communication networks 在 IEC-61850 通信网络中实现入侵检测特征工程
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-03 DOI: 10.1007/s12243-024-01011-x
Vagner E. Quincozes, Silvio E. Quincozes, Diego Passos, Célio Albuquerque, Daniel Mossé

Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.

数字化变电站是为智能电网提供可靠基础的根本。然而,智能电子设备 (IED) 之间通信的 IEC-61850 标准的部署带来了新的安全挑战。入侵检测系统(IDS)在确保数字变电站服务正常运行方面发挥着至关重要的作用。然而,目前的文献缺乏针对某些攻击类别(如伪装攻击)的高效 IDS 解决方案。在这项工作中,我们提出通过特征工程流程提取和关联相关的多层信息,以便在数字变电站中部署基于机器学习的 IDS。我们的研究结果表明,所提出的解决方案可以检测到文献中认为具有挑战性的攻击,在评估的场景中,F1 分数高达 95.6%。
{"title":"Towards feature engineering for intrusion detection in IEC–61850 communication networks","authors":"Vagner E. Quincozes,&nbsp;Silvio E. Quincozes,&nbsp;Diego Passos,&nbsp;Célio Albuquerque,&nbsp;Daniel Mossé","doi":"10.1007/s12243-024-01011-x","DOIUrl":"10.1007/s12243-024-01011-x","url":null,"abstract":"<div><p>Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"537 - 551"},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zt &t: secure service session management using blockchain-based tokens in zero trust networks. Zt &t:在零信任网络中使用基于区块链的代币进行安全服务会话管理。
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-03 DOI: 10.1007/s12243-023-01008-y
Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Afaq Muhammad, Wang-Cheol Song

In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.

在当今的互联世界中,网络边界的分界线已无法确定。因此,人们提出了零信任网络(ZTN)和软件定义边界(SDP)的概念,旨在将信任边界扩展到与网络连接的每个实体,无论其物理位置如何。然而,实施复杂的安全机制并为每次交互提供持续的信任保证可能具有挑战性。一种解决方案是将区块链技术整合到零信任中,以提供安全性。区块链具有数据去中心化、匿名、加密和不可更改的交易记录等特点,可以加以利用。这项工作提出了一种利用区块链功能进行安全服务会话管理的机制。不可篡改代币(NFT)适用于代表服务消费策略协议的访问和提供者代币。这些代币被映射到在区块链中注册的实体的公共地址。该提案通过开源零信任平台和私有以太坊区块链实现。
{"title":"Zt &t: secure service session management using blockchain-based tokens in zero trust networks.","authors":"Javier Jose Diaz Rivera,&nbsp;Waleed Akbar,&nbsp;Talha Ahmed Khan,&nbsp;Afaq Muhammad,&nbsp;Wang-Cheol Song","doi":"10.1007/s12243-023-01008-y","DOIUrl":"10.1007/s12243-023-01008-y","url":null,"abstract":"<div><p>In today’s interconnected world, the line that separates the network perimeter can no longer be identified. This has led to the development of Zero Trust Networking (ZTN) and Software Defined Perimeter (SDP) concepts, which aim to extend the perimeter of trust to every entity connected to the network regardless of their physical location. However, implementing complex security mechanisms and constant trust assurance for every interaction can be challenging. One solution is integrating blockchain technology into Zero Trust to provide security. Blockchain offers features such as data decentralization, anonymity, cryptography, and immutable record of transactions that can be utilized. This work proposes a mechanism for secure service session management using blockchain capabilities. Non-fungible tokens (NFT) are applied to access and provider tokens representing a policy agreement for service consumption. These tokens are mapped to the public addresses of entities registered in the blockchain. The proposal is realized through an open-source Zero Trust platform and a private Ethereum blockchain.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"487 - 505"},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison 为云到边缘的连续性释放分散式无服务器物联网数据流架构的威力:性能比较
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-01-11 DOI: 10.1007/s12243-023-01009-x
Juan José López Escobar, Rebeca P. Díaz-Redondo, Felipe Gil-Castiñeira

The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.

新的计算和通信趋势(如边缘计算、5G 和 IIoT)将无处不在的数据源和消费者联系在一起,这些趋势的出现促进了 "云到边缘连续性 "的发展,以便利用大规模物联网场景中的可用资源并进行数据分析,从而在各个层面利用智能。本文概述了这种新型物联网环境的挑战性要求,并提出了一种创新的物联网框架,用于开发以数据为中心的环境中的数据流应用程序。所提出的设计利用分散式 Pub/Sub 通信和无服务器纳米服务架构,分别使用 Zenoh 和 WebAssembly 等新技术,在云到边缘基础设施上实现轻量级服务。我们还介绍了一些使用案例,以说明未来物联网时代的优势和关注点,并对 Zenoh 与中介 MQTT 策略的通信性能进行了比较。
{"title":"Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison","authors":"Juan José López Escobar,&nbsp;Rebeca P. Díaz-Redondo,&nbsp;Felipe Gil-Castiñeira","doi":"10.1007/s12243-023-01009-x","DOIUrl":"10.1007/s12243-023-01009-x","url":null,"abstract":"<p>The advent of new computing and communication trends that link pervasive data sources and consumers, such as Edge Computing, 5G and IIoT, has led to the development of the Cloud-to-Edge Continuum in order to take advantage of the resources available in massive IoT scenarios and to conduct data analysis to leverage intelligence at all levels. This paper outlines the challenging requirements of this novel IoT context and presents an innovative IoT framework to develop dataflow applications for data-centric environments. The proposed design takes advantage of decentralized Pub/Sub communication and serverless nanoservice architecture, using novel technologies such as Zenoh and WebAssembly, respectively, to implement lightweight services along the Cloud-to-Edge infrastructure. We also describe some use cases to illustrate the benefits and concerns of the coming IoT generation, giving a communication performance comparison of Zenoh over brokered MQTT strategies.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"135 - 148"},"PeriodicalIF":1.8,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-01009-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139438114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control 利用 IOTA 和使用控制为物联网带来隐私、安全和性能
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-01-09 DOI: 10.1007/s12243-023-01005-1
Nathanael Denis, Sophie Chabridon, Maryline Laurent

The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.

物联网(IoT)带来了收集和分析数据的新方法,以开发满足或预测用户需求的应用程序。这些数据可能对隐私敏感,需要高效的隐私保护机制。物联网是一个规模空前的分布式系统,给性能和安全性带来了挑战。传统的区块链可以提供去中心化和强大的安全保证,从而成为一种解决方案。然而,对于大规模物联网系统来说,它们的效率和可扩展性都不够高,而且由于交易成本高和交易率不足,为保护区块链隐私而设计的现有工具(如硬币混合)效果有限。本文提供了一个基于多种技术的框架,以满足物联网对隐私、安全和性能的要求。该框架的基础是 IOTA 技术,它是区块链的衍生技术,依靠有向无环图来创建交易,而不是线性链。随着越来越多的用户加入网络,IOTA 可以提高交易吞吐量,使网络具有可扩展性,从而提高分布式账本的性能。由于 IOTA 并非为保护隐私而设计,因此我们采用了隐私保护机制对其进行补充:避免合并和分散混合。最后,通过引入使用控制机制,用户可以监控其数据的使用和传播,从而加强隐私保护。我们提出了一个概念验证,以证明拟议框架的可行性。对这一概念验证进行了性能测试,结果表明该框架可以在资源受限的设备上运行,并且能在合理的时间内完成。这一贡献的独创性还在于将 IOTA 节点集成到使用控制系统中,以支持尽可能接近需要隐私的对象。
{"title":"Bringing privacy, security and performance to the Internet of Things using IOTA and usage control","authors":"Nathanael Denis,&nbsp;Sophie Chabridon,&nbsp;Maryline Laurent","doi":"10.1007/s12243-023-01005-1","DOIUrl":"10.1007/s12243-023-01005-1","url":null,"abstract":"<div><p>The Internet of Things (IoT) is bringing new ways to collect and analyze data to develop applications answering or anticipating users’ needs. These data may be privacy-sensitive, requiring efficient privacy-preserving mechanisms. The IoT is a distributed system of unprecedented scale, creating challenges for performance and security. Classic blockchains could be a solution by providing decentralization and strong security guarantees. However, they are not efficient and scalable enough for large scale IoT systems, and available tools designed for preserving privacy in blockchains, e.g. coin mixing, have a limited effect due to high transaction costs and insufficient transaction rates. This article provides a framework based on several technologies to address the requirements of privacy, security and performance of the Internet of Things. The basis of the framework is the IOTA technology, a derivative of blockchains relying on a directed acyclic graph to create transactions instead of a linear chain. IOTA improves distributed ledger performance by increasing transaction throughput as more users join the network, making the network scalable. As IOTA is not designed for privacy protection, we complement it with privacy-preserving mechanisms: merge avoidance and decentralized mixing. Finally, privacy is reinforced by introducing usage control mechanisms for users to monitor the use and dissemination of their data. A Proof of Concept is proposed to demonstrate the feasibility of the proposed framework. Performance tests are conducted on this Proof of Concept, showing the framework can work on resource-constrained devices and within a reasonable time. The originality of this contribution is also to integrate an IOTA node within the usage control system, to support privacy as close as possible to the objects that need it.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 7-8","pages":"585 - 601"},"PeriodicalIF":1.8,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
pRTMNSGA-III: a novel multi-objective algorithm for QoS-aware multi-cloud IoT service selection pRTMNSGA-III:用于选择 QoS 感知多云物联网服务的新型多目标算法
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-01-09 DOI: 10.1007/s12243-023-01006-0
Ahmed Zebouchi, Youcef Aklouf

The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.

物联网(IoT)是一项新兴技术,预计将发挥重要作用。物联网与云计算(CC)的融合,使人们能够创建大规模的智能设备和服务互联网络。为了向用户提供最佳服务质量(QoS),有必要解决物联网服务中相互冲突的要求。服务选择问题被认为是 NP 难题,因此需要使用元启发式算法来高效解决。本文提出了一种新颖的混合多目标元启发式 pRTMNSGA-III,它结合了 RNSGA-III 和 TMNSGA-III 的优势,可生成满足用户偏好并消除不利因素的解决方案。为了进一步优化计算时间,采用了并行解评估方法。此外,还提出了一种更有效的模糊成员函数,以根据请求者偏好的 QoS 选择最佳解决方案。我们在多个数据集上对所提出的算法进行了评估,结果表明该算法优于现有的最先进算法,包括 RNSGA-III、TMNSGA-III、NSGA-III、pNSGA-II、NSGA-II 和 NSPSO 实验结果表明,pRTMNSGA-III 在生成的非主导解的数量上比现有算法高出 37%。
{"title":"pRTMNSGA-III: a novel multi-objective algorithm for QoS-aware multi-cloud IoT service selection","authors":"Ahmed Zebouchi, Youcef Aklouf","doi":"10.1007/s12243-023-01006-0","DOIUrl":"https://doi.org/10.1007/s12243-023-01006-0","url":null,"abstract":"<p>The Internet of Things (IoT) is an emerging technology expected to play a significant role. The integration of IoT with cloud computing (CC) has enabled the creation of large-scale networks of interconnected smart devices and services. To provide optimal quality of service (QoS) for users, it is necessary to address the conflicting requirements of IoT services. The service selection problem is considered NP-hard and therefore requires using metaheuristic algorithms for efficient resolution. This paper presents a novel hybrid multi-objective metaheuristic, pRTMNSGA-III, which combines the strengths of RNSGA-III and TMNSGA-III to generate solutions that meet user preferences and eliminate unfavorable ones. To further optimize computational time, a parallel solution evaluation approach is employed. In addition, a more effective fuzzy membership function is proposed to select the best solution based on the requester’s preferred QoS. The proposed algorithm is evaluated on multiple datasets, and the results demonstrate its superiority over existing state-of-the-art algorithms, including RNSGA-III, TMNSGA-III, NSGA-III, pNSGA-II, NSGA-II, and NSPSO Experimental results demonstrate that pRTMNSGA-III outperforms existing algorithms by up to 37% in terms of the number of non-dominated solutions generated.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"16 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139411442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart contract implementation on network sharing for 6G wireless networks 为 6G 无线网络实现网络共享的智能合约
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-01-08 DOI: 10.1007/s12243-023-01007-z
Vuppula Roopa, Himansu Shekhar Pradhan

In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.

在本文中,我们实现了一种新颖的面向区块链的 RAN(BRAN),允许多个参与者以自主和动态的虚拟网络功能(VNF)来交易 RAN 实用程序(如基础设施)。特别是,我们设计了一种多玩家网络共享(MPNS)智能合约,它可以使用静态或面向自由市场的模式实现 RAN 共享流程的自动化。我们根据用户设备(UE)容量、UE 满意率、基站(BS)效率和端到端延迟参数,评估了通过基于拍卖和自由市场的 RAN 共享方法获得的模拟结果。然后将这些结果与现有静态 RAN 的结果进行了比较。从仿真结果可以看出,与现有的静态 RAN 相比,随着 RAN 环境中参与者数量的增加,以区块链为导向的自由市场 RAN 共享机制在 UE 容量方面的效率提高了 35%,在 UE 满意率方面的效率提高了 40.5%。所提出的 BRAN 范式在 6G 无线网络中有着广阔的应用前景,因为用户的安全性、容量、满意率和延迟是 6G 无线网络的关键限制因素。
{"title":"Smart contract implementation on network sharing for 6G wireless networks","authors":"Vuppula Roopa, Himansu Shekhar Pradhan","doi":"10.1007/s12243-023-01007-z","DOIUrl":"https://doi.org/10.1007/s12243-023-01007-z","url":null,"abstract":"<p>In this article, we implemented a novel blockchain-oriented RAN (BRAN) by allowing multiple players to trade RAN utilities (such as infrastructure) in terms of virtual network functions (VNFs) that are autonomous and dynamic. Particularly, we designed a multi-player network sharing (MPNS) smart contract which enables the automation of RAN-sharing processes using static or free-marketplace-oriented paradigms. The simulation results, acquired through auction-based and free-marketplace RAN-sharing methods, were evaluated based on user equipment (UE) capacity, UE satisfaction rate, base station (BS) efficiency, and end-to-end latency parameters. These results were then compared to those of the existing static RAN. It is observed from the simulation results that the performance of the blockchain-oriented free-marketplace RAN-sharing mechanism is 35% more efficient in terms of UE capacity and 40.5% more efficient in terms of UE satisfaction rate when compared to existing static RAN with the increase as the number of players in RAN environments. The proposed BRAN paradigm has spacious applications in 6G wireless networks, where user’s security, capacity, satisfaction rate, and latency are crucial constraints.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"6 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139396868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1